Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 02:19

General

  • Target

    30ebe15d37c18d6c19258fa547476899148f6838acc69886b34f3d42cc3d1055.exe

  • Size

    1.8MB

  • MD5

    5bf4922bc890a31eeab4a02f9fcb0a6a

  • SHA1

    09818a8377fd94f850a7a70b0b3afacbe803175f

  • SHA256

    30ebe15d37c18d6c19258fa547476899148f6838acc69886b34f3d42cc3d1055

  • SHA512

    9968b0a3dad292267e27cc5997d11e173d1266ffdb792045641aa0401361f55b2274ccc5f66ed524ebd49e8e72982540d306aa8eed4e3b5313e3e40d407243b8

  • SSDEEP

    49152:GM9QPdxwfE7WlFwKAfzuTiDFUFkYgDUYmvFur31yAipQCtXxc0H:G1PdVQFwKZCFgaU7dG1yfpVBlH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 33 IoCs
  • Modifies data under HKEY_USERS 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\30ebe15d37c18d6c19258fa547476899148f6838acc69886b34f3d42cc3d1055.exe
    "C:\Users\Admin\AppData\Local\Temp\30ebe15d37c18d6c19258fa547476899148f6838acc69886b34f3d42cc3d1055.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3000
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2828
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2992
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2920
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1620
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3016
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 250 -NGENProcess 258 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1704
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 250 -NGENProcess 244 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 24c -NGENProcess 260 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1476
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 258 -NGENProcess 264 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 1a8 -NGENProcess 244 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 258 -NGENProcess 238 -Pipe 1a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:300
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 238 -NGENProcess 25c -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1696
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 274 -NGENProcess 26c -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2688
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 258 -NGENProcess 27c -Pipe 238 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2088
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2364
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2304
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:448
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:376
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:2584
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2440
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2476
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2336
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:1752
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:1340
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1092
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:1256
  • C:\Windows\System32\msdtc.exe
    C:\Windows\System32\msdtc.exe
    1⤵
    • Executes dropped EXE
    PID:872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.6MB

    MD5

    52343f16ccf7915c9f51de69601478d0

    SHA1

    6ff18074d4761b35d6e7a201120cb4c72789cf7b

    SHA256

    1256b1d7694e76105cd01379ea57b7ab09aeac847c687960e7d98e79ee2b7a18

    SHA512

    8ab52d9fcf0e86869a032a9f097dbe640b13b2273374dc6ca81bf625aca0521f52d132d0233a72872f07c28b519efcd2a7563deea23564500a841b0fba786fb0

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    4377f32f420b5d721d6442a361e2c2bd

    SHA1

    123f7527a0131b79de8a789ae44d82a68026b4b1

    SHA256

    2b0ec3f3b58a721653941179202a9b81c0bbe4b0a56b4827d91cb58e38598c90

    SHA512

    760a4347f628140a6ea12d44340525c052f275ecc3391cab56335aa60357ac7e07e79938e297a48aa2549cef97739941c91e6256af78335575bd5161023a220a

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.6MB

    MD5

    47332fa0d0edfdd7c3a2f08d919e100c

    SHA1

    408964ee589a64d56f17896220d2313bdeabcc98

    SHA256

    59405d23022ca0a075e2d650cc358bace39768e4882b0767423b1b8f10e101d4

    SHA512

    d72dfc50fa73f20ac722af2f9cfd4685c2416aad698776bfa3378c8d3ca152f75faac2b0f094ce95e592502231dc1ec06e17f037f53eccc0bcc153d1984d2dab

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.1MB

    MD5

    ddd7335dca59650bf51f7267b3740a55

    SHA1

    068146a29e949048af2ec002074bfddac435c768

    SHA256

    03549860430bb692b32f80db948f909b05560a92b4c6161fd19d73654288af33

    SHA512

    9dcdca37733c8fda62effb526795c5bc3817d362fb549940b4e7ef2edc8fcd8f7771e80e7d9a69b5ad2b56572d8d5639d61be8a56bf43472f017e7e45c094804

  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

    Filesize

    5.2MB

    MD5

    9851bee71ec19c61f329342aa10b3e1d

    SHA1

    abf14fa62b6af239aace2307c3e456e5ab055525

    SHA256

    9509c8705190b89afe2d9c33d63b0e1ee18f3f7cda414342593b93526964e7be

    SHA512

    e2e0a16118bd65f89221754980200279c50db22e5d0fe299c4581c6b03c86f310be0b6804d5e6386e1c60523838c68ad714ea1d580ff30ea3086640328ff4f6b

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    4a3c0350cb520447c3cfeb99d06644e3

    SHA1

    49bd674d020dd3ee9c094ca3c4a4b0353854b622

    SHA256

    73831a9a9ad9c1b5a751928924dcd3fa961c8e3e7ba7413f594c7f6ca4dc9be6

    SHA512

    9e9c7ce2f0d475fa071c11980258c13d41af3cf0f70e3210724dd0c2125b7d507570f66420c9007ddd441c861bd5faa1a4e855f4613c35bac57c84fefbeb1aaf

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    1478a3f8a1cfe3b8ea390f0d12d5fbf6

    SHA1

    bb327f0bde15d12dc226cd431e2c2a254ebf093e

    SHA256

    f507b595166622817a5f5f256f63c19dd1b2741cf620d6606c40e0a144485e06

    SHA512

    2fd91fba03d6b4ecbad9cb535ab2ae2a6fab49ea239402b342c8193986fa13e6ab2a36a3fd035824ed2135732b8883c311fdbfcef80ff6ba98cddeed333eee39

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.5MB

    MD5

    8b0285e5a64920ca3b31c8f93d0eda6d

    SHA1

    d227c52844e1c2869b50eb2399ba34039cbe20d7

    SHA256

    59648b09fcd7cf3f4e10830de22be97a20375a2b30bf3fee6b80a77335f0cf76

    SHA512

    e6395bf134545d5dee1416fa496372853d7d7d0f7c5e422d081e40a7fbc002d69f899cb1aec349b807a76c3471b6d07335eb79510982a5cec16cd18bdfa57fd1

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.5MB

    MD5

    62b68c688fe31f7dcf0c0391eadd3443

    SHA1

    a6ad267ba77bd17823ffa958b181ebf13f66cd85

    SHA256

    4fa6b1ebc100172977d09e39c753004d3b05cc357058e3d48a495266247ad480

    SHA512

    a295e697b8bb7d33445e7b2c2462d1b756f0af2d103c2ac508e6d8f239bd28a52014e04fc0864b20cf7214f564ff03d9975f604bec1aa30942ec78a08c13c657

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    eec1a674c942720be72ba6ab97a28892

    SHA1

    9144909680f99d49fff1233cecac4ae11cfd6c8e

    SHA256

    e1cf83ce3e39633589e98f4057b5e18ec1bacc6dabbe6f8599d1ed5f092420f4

    SHA512

    71bf389d4cca191c873e1cf34f26334d953bd74b8256d63db8ee3137b7a48337ee260286855a793699c01e163f190f98fff1d77298cffa9a88f04265311f10d2

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.5MB

    MD5

    d532dbc2e437c25d48e4aab6e1e07dc3

    SHA1

    bd337d618ee76bfa5784932deb07c12ae7f1b88a

    SHA256

    c3f860c556524bab4ef18fd9a475dfe94bb77615e2066d33be99cf6882d43790

    SHA512

    8ee777efcecc9421fe68435696371087ad1b963400a2ca255c881471263040c2a40fafa6d72b3e864eec96850daad523178a0c611c17b59735d0e955386f7c62

  • C:\Windows\System32\msdtc.exe

    Filesize

    64KB

    MD5

    3b8af464f6dd0326ec64100bed14f9b7

    SHA1

    1e55de1a6494d023d591f1643dbc6af75d0f9ada

    SHA256

    b9067f3da06284fa9d8077cdb4fcf2f240a3b2caaf55ab4146b4dd876528dc89

    SHA512

    e3eb4482d3958a119eea58dc8129da1f2e683597e40217ceedaff20602151bdb6b9751c61f7fdc39c34bcab876507e82d50bf8932a5389dc2f31fc8176b46d23

  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.5MB

    MD5

    5756f03926460b57ff4e7043e56af6e8

    SHA1

    aaa3b95cd1ade63679d509d0058acc766b2b734c

    SHA256

    a04934b41a2c3aed60a007525767923dfcea67cda0c37784df938d16c6328fe2

    SHA512

    e1aa34bf6d0d9a6a71f1809aa812728bda94d8c5f03fa3a9ad646da7ec03f96fc5968e3377abe1862ad4342546a6009ff13cacbcc1b6a73e7abde962d1b33d6e

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.5MB

    MD5

    50b2ad58741ac823a37630b02b3d4a25

    SHA1

    92a4f0cf943c184fc0314469ee6f03ffc448725b

    SHA256

    afbbe6750b5d6abae844e0bce7d72b2ae98a320e98bd910c2fc46eec528e8631

    SHA512

    7cd902134b14332e95ec0478f8f206205d024876a1bb153c646842093d14e34439d13719d91992d0e378f1929fb4da8817ab0f560165b8f3704233bb837795b3

  • \Windows\System32\alg.exe

    Filesize

    1.5MB

    MD5

    abbd55f7b711d4c542d42bd9138f84a8

    SHA1

    0339041b19fe2c538da3cc9b44cabbd7507ea390

    SHA256

    9d547d031edb0267004ef58b65cb6ebbc85d618cb0d85fd0ba2df7810e040960

    SHA512

    b6108b7199eba0d593680e9178a194be61197134f1e40cc65c7ff17b38bf68903a9924af5f9aaa08699614c948a95ead5e693097574d39c761cf9ff5e7d4ff4d

  • \Windows\System32\dllhost.exe

    Filesize

    1.4MB

    MD5

    abd2df3c37c43670da0db8360d18c253

    SHA1

    52211f427917c29b181d395a0ed11d4ddaf9f04d

    SHA256

    e80369ca0fc475f88dc5ca35c17adc754c97c867fcbacbb459bbb36c91206dde

    SHA512

    1eed2f0e3d564f5fc51445bf3f61a31ce9772665096d3b185e469d1a5313c7ec81e1f944c4b032206820b8aba81eb7a8a28972c8b54cf5fc366de6753d2b5500

  • \Windows\System32\ieetwcollector.exe

    Filesize

    1.5MB

    MD5

    c0a24fecde0af25be30c19c5f5706d09

    SHA1

    9ef20ca84ea797c4f5d63d91a88117f22da657d0

    SHA256

    02885cd6cb0b80de3f231c70c4f9647848f4f0a4072ddda71f8ace58cb14f6db

    SHA512

    0b7cc487b86f6358c20779b834fb16e16f76f03210601d1148014e84c0ccc12bd48e130b683094f517c163ed38de05ed4f279f61539ff8878d5ce7bf2279f3c7

  • \Windows\System32\msdtc.exe

    Filesize

    192KB

    MD5

    c887f7a281479bd9967f7454498355b4

    SHA1

    e6d14b0407adbdd4d43d2c689b71435d744c1aa5

    SHA256

    7005814d42cf2ae4eb40b61a5530297c0455a569df5006ec17487715c12ce3ba

    SHA512

    c1028df3431ffe037bed3385f8234254f9477d27d4d561ab5adb5f777c4e7a50567a753b0b5a32fc6fff067e3b5fae57259645965d76e1d613af60d528d6ef81

  • \Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    f847db4b5522e1e593dcf788dd26a63c

    SHA1

    1807334c460fd6035f1c7635a663504b4ae04414

    SHA256

    39157d3ff65e008d78f92c69eafdbb7a0fba0dc97f838714be0f1e1e94b2dca4

    SHA512

    098df7d1ae99a092ba88105f16b0660910464cc7146f675eda0eb57f8ed14c7f4347ff42a8a2eae619326cdb313a99c694994e66b56fe63794695f797cdbbdd9

  • \Windows\ehome\ehsched.exe

    Filesize

    1.6MB

    MD5

    c09df54bddf47c17aa94774d4f4b2010

    SHA1

    14ba77dfcacdfc537659f2ae1024615f3aa4137b

    SHA256

    a87525b91b434c979380d18b204cbd07407cceb9c9b272303eb9d06331dd7109

    SHA512

    038b945c4352f34cdc5d1bae0999faf70cf5be7a9decee216290633b17b64ee0160661ef52df61c9dc8b1ef8b4a997ba2276492686ed8d50df68d5aa4b412f89

  • memory/376-211-0x0000000140000000-0x0000000140192000-memory.dmp

    Filesize

    1.6MB

  • memory/376-308-0x0000000000180000-0x00000000001E0000-memory.dmp

    Filesize

    384KB

  • memory/376-339-0x0000000140000000-0x0000000140192000-memory.dmp

    Filesize

    1.6MB

  • memory/448-332-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/448-301-0x0000000001A30000-0x0000000001A31000-memory.dmp

    Filesize

    4KB

  • memory/448-337-0x0000000000180000-0x00000000001E0000-memory.dmp

    Filesize

    384KB

  • memory/448-202-0x0000000000180000-0x00000000001E0000-memory.dmp

    Filesize

    384KB

  • memory/448-195-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/764-397-0x0000000000360000-0x00000000003C7000-memory.dmp

    Filesize

    412KB

  • memory/1476-382-0x0000000000380000-0x00000000003E7000-memory.dmp

    Filesize

    412KB

  • memory/1476-387-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1616-386-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/1616-372-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1616-385-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1616-364-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/1620-123-0x0000000010000000-0x0000000010187000-memory.dmp

    Filesize

    1.5MB

  • memory/1620-177-0x0000000010000000-0x0000000010187000-memory.dmp

    Filesize

    1.5MB

  • memory/1620-124-0x00000000001F0000-0x0000000000250000-memory.dmp

    Filesize

    384KB

  • memory/1620-131-0x00000000001F0000-0x0000000000250000-memory.dmp

    Filesize

    384KB

  • memory/1704-368-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/1704-355-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1704-345-0x0000000000590000-0x00000000005F7000-memory.dmp

    Filesize

    412KB

  • memory/1704-369-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2204-328-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2204-303-0x00000000006D0000-0x0000000000737000-memory.dmp

    Filesize

    412KB

  • memory/2204-291-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2204-326-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2204-333-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2304-315-0x0000000100000000-0x0000000100175000-memory.dmp

    Filesize

    1.5MB

  • memory/2304-189-0x00000000004C0000-0x0000000000520000-memory.dmp

    Filesize

    384KB

  • memory/2304-182-0x0000000100000000-0x0000000100175000-memory.dmp

    Filesize

    1.5MB

  • memory/2304-181-0x00000000004C0000-0x0000000000520000-memory.dmp

    Filesize

    384KB

  • memory/2336-410-0x0000000000AE0000-0x0000000000B47000-memory.dmp

    Filesize

    412KB

  • memory/2336-405-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/2364-307-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-168-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-166-0x00000000005D0000-0x0000000000630000-memory.dmp

    Filesize

    384KB

  • memory/2364-160-0x00000000005D0000-0x0000000000630000-memory.dmp

    Filesize

    384KB

  • memory/2476-329-0x000007FEF4250000-0x000007FEF4BED000-memory.dmp

    Filesize

    9.6MB

  • memory/2476-351-0x00000000010C0000-0x0000000001140000-memory.dmp

    Filesize

    512KB

  • memory/2476-371-0x00000000010C0000-0x0000000001140000-memory.dmp

    Filesize

    512KB

  • memory/2476-389-0x000007FEF4250000-0x000007FEF4BED000-memory.dmp

    Filesize

    9.6MB

  • memory/2476-327-0x00000000010C0000-0x0000000001140000-memory.dmp

    Filesize

    512KB

  • memory/2476-375-0x000007FEF4250000-0x000007FEF4BED000-memory.dmp

    Filesize

    9.6MB

  • memory/2476-370-0x000007FEF4250000-0x000007FEF4BED000-memory.dmp

    Filesize

    9.6MB

  • memory/2476-352-0x00000000010C0000-0x0000000001140000-memory.dmp

    Filesize

    512KB

  • memory/2584-363-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/2584-311-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/2600-141-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/2600-140-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2600-298-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2600-147-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/2828-15-0x0000000100000000-0x0000000100184000-memory.dmp

    Filesize

    1.5MB

  • memory/2828-16-0x00000000001A0000-0x0000000000200000-memory.dmp

    Filesize

    384KB

  • memory/2828-56-0x00000000001A0000-0x0000000000200000-memory.dmp

    Filesize

    384KB

  • memory/2828-55-0x00000000001A0000-0x0000000000200000-memory.dmp

    Filesize

    384KB

  • memory/2828-159-0x0000000100000000-0x0000000100184000-memory.dmp

    Filesize

    1.5MB

  • memory/2920-106-0x0000000010000000-0x000000001017F000-memory.dmp

    Filesize

    1.5MB

  • memory/2920-107-0x00000000006A0000-0x0000000000707000-memory.dmp

    Filesize

    412KB

  • memory/2920-157-0x0000000010000000-0x000000001017F000-memory.dmp

    Filesize

    1.5MB

  • memory/2920-113-0x00000000006A0000-0x0000000000707000-memory.dmp

    Filesize

    412KB

  • memory/2992-95-0x0000000000AA0000-0x0000000000B00000-memory.dmp

    Filesize

    384KB

  • memory/2992-102-0x0000000000AA0000-0x0000000000B00000-memory.dmp

    Filesize

    384KB

  • memory/2992-94-0x0000000140000000-0x000000014017D000-memory.dmp

    Filesize

    1.5MB

  • memory/2992-180-0x0000000140000000-0x000000014017D000-memory.dmp

    Filesize

    1.5MB

  • memory/3000-295-0x0000000000400000-0x00000000005CD000-memory.dmp

    Filesize

    1.8MB

  • memory/3000-139-0x0000000000400000-0x00000000005CD000-memory.dmp

    Filesize

    1.8MB

  • memory/3000-0-0x0000000000400000-0x00000000005CD000-memory.dmp

    Filesize

    1.8MB

  • memory/3000-6-0x0000000001DE0000-0x0000000001E47000-memory.dmp

    Filesize

    412KB

  • memory/3000-1-0x0000000001DE0000-0x0000000001E47000-memory.dmp

    Filesize

    412KB

  • memory/3016-350-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/3016-330-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/3016-331-0x0000000000820000-0x0000000000887000-memory.dmp

    Filesize

    412KB

  • memory/3016-334-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/3016-349-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB